Spreading techniques and its detection by Deception

October 10, 2017

Ransomware is a critical threat that is currently affecting organizations. It is estimated that in 2017[14], damages due to ransomware will exceed $5 billion. Some of the prominent ransomware families, such as CryptoWall [6], Crypto Fortress [7], DMA-Locker [8] and CryptoLocker [4], not only encrypt files on the endpoint but also perform lateral movement to both mapped and unmapped file shares and encrypt files in these shares. WannCry[1] exploited SMB remote code execution vulnerability (CVE-2017-0144) and affected 150 countries.Petya[3] used the same vulnerability (MS17-010) along with WMI with stolen passwords for lateral movement and impacted 65 countries. Shamoon was using hard-coded usernames and passwords for lateral movement to infect the computers inside the network and erased data on 75% of Aramco's corporate PCs[13].These examples demonstrate that the severity of any threat gets multiplied and severe when spreading techniques are employed.

Spotlight

Mavinci Global Cyber Security Solutions

Mavinci Global Inks Partnership With Wedge Networks to Provide Real-Time Threat Prevention to the Public and Private Sectors. WedgeARP™ provides network-based, real-time threat protection for all types of endpoints in a wide range of networks (mobile data, 5G, SD-WAN, SASE, enterprise and carrier networks, SDN, and smart-city/IIoT). With an embedded deep learning AI engine and patented real-time deep content inspection technology, WedgeARP™ can detect never-before-seen malware in milliseconds. Running on an orchestrated threat management platform, it is an effective and autonomous approach to enable large-scale real-time threat prevention.

OTHER WHITEPAPERS
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

Cyber Threat Predictions for 2023

whitePaper | November 3, 2022

While “less is more” is the critical strategy behind consolidating networks and security, “more is more” seems to be the mantra cybercriminals continue to live by. The most troubling trend we’ve observed across the cyber landscape is one we see continuing into the future—that threats of all kinds are becoming increasingly ubiquitous. From Ransomware-as-a-Service (RaaS) to new attacks on nontraditional targets like edge devices to the emerging use of wipers, the volume and variety of cyberthreats will keep security teams on their toes in 2023 and beyond.

Read More
news image

Reveal Risk Whitepaper: Measuring And Managing Cyber Resilience

whitePaper | March 3, 2023

Cyber Resilience (according to NIST) is “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.” Resiliency in cybersecurity is not a new concept. It has long been postulated as a goal or used to convey that a business needs to be ready for the unpredictable that can and will arise in a volatile cyber-risk climate. However, we have seen that there is a disconnect between current practices for evaluating & leading cyber programs, and understanding, measuring, & building true cyber resiliency.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More

Spotlight

Mavinci Global Cyber Security Solutions

Mavinci Global Inks Partnership With Wedge Networks to Provide Real-Time Threat Prevention to the Public and Private Sectors. WedgeARP™ provides network-based, real-time threat protection for all types of endpoints in a wide range of networks (mobile data, 5G, SD-WAN, SASE, enterprise and carrier networks, SDN, and smart-city/IIoT). With an embedded deep learning AI engine and patented real-time deep content inspection technology, WedgeARP™ can detect never-before-seen malware in milliseconds. Running on an orchestrated threat management platform, it is an effective and autonomous approach to enable large-scale real-time threat prevention.

Events